[ 53.060176][ T40] audit: type=1400 audit(1770248299.403:60): avc: denied { rlimitinh } for pid=5916 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 53.066673][ T40] audit: type=1400 audit(1770248299.403:61): avc: denied { siginh } for pid=5916 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 Warning: Permanently added '[localhost]:25868' (ED25519) to the list of known hosts. [ 82.045152][ T40] audit: type=1400 audit(1770248328.403:62): avc: denied { execute } for pid=5943 comm="sh" name="syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 82.053899][ T40] audit: type=1400 audit(1770248328.403:63): avc: denied { execute_no_trans } for pid=5943 comm="sh" path="/syz-execprog" dev="sda1" ino=2020 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 2026/02/04 23:38:49 parsed 1 programs [ 83.301570][ T40] audit: type=1400 audit(1770248329.653:64): avc: denied { node_bind } for pid=5943 comm="syz-execprog" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 85.313183][ T40] audit: type=1400 audit(1770248331.673:65): avc: denied { mounton } for pid=5953 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2023 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 85.322204][ T40] audit: type=1400 audit(1770248331.673:66): avc: denied { mount } for pid=5953 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 85.322616][ T5953] cgroup: Unknown subsys name 'net' [ 85.332321][ T40] audit: type=1400 audit(1770248331.693:67): avc: denied { unmount } for pid=5953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 85.466668][ T5953] cgroup: Unknown subsys name 'cpuset' [ 85.472711][ T5953] cgroup: Unknown subsys name 'rlimit' [ 85.667204][ T40] audit: type=1400 audit(1770248332.023:68): avc: denied { setattr } for pid=5953 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 85.674845][ T40] audit: type=1400 audit(1770248332.023:69): avc: denied { create } for pid=5953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.681269][ T40] audit: type=1400 audit(1770248332.023:70): avc: denied { write } for pid=5953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.688495][ T40] audit: type=1400 audit(1770248332.023:71): avc: denied { read } for pid=5953 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 85.739550][ T5956] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 86.449193][ T5953] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 86.554068][ T830] cfg80211: failed to load regulatory.db [ 88.026651][ T40] kauditd_printk_skb: 10 callbacks suppressed [ 88.026669][ T40] audit: type=1400 audit(1770248334.383:82): avc: denied { execmem } for pid=5960 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 88.037144][ T40] audit: type=1400 audit(1770248334.383:83): avc: denied { read } for pid=5961 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.046277][ T40] audit: type=1400 audit(1770248334.383:84): avc: denied { open } for pid=5961 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.055779][ T40] audit: type=1400 audit(1770248334.383:85): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 88.083430][ T40] audit: type=1400 audit(1770248334.443:86): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.091575][ T40] audit: type=1400 audit(1770248334.443:87): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.PXxtAJ/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 88.098863][ T40] audit: type=1400 audit(1770248334.443:88): avc: denied { mount } for pid=5961 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 88.105310][ T40] audit: type=1400 audit(1770248334.443:89): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.PXxtAJ/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 88.112975][ T40] audit: type=1400 audit(1770248334.443:90): avc: denied { mounton } for pid=5961 comm="syz-executor" path="/syzkaller.PXxtAJ/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3897 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 88.120885][ T40] audit: type=1400 audit(1770248334.453:91): avc: denied { unmount } for pid=5961 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 88.131439][ T5961] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 88.945323][ T5294] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 88.953081][ T5294] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 88.958736][ T5294] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 88.965168][ T5294] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 88.969242][ T5294] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 89.174257][ T6003] chnl_net:caif_netlink_parms(): no params data found [ 89.268167][ T6003] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.270650][ T6003] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.280874][ T6003] bridge_slave_0: entered allmulticast mode [ 89.283874][ T6003] bridge_slave_0: entered promiscuous mode [ 89.288147][ T6003] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.290736][ T6003] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.294964][ T6003] bridge_slave_1: entered allmulticast mode [ 89.300544][ T6003] bridge_slave_1: entered promiscuous mode [ 89.336567][ T6003] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 89.344876][ T6003] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 89.372155][ T6003] team0: Port device team_slave_0 added [ 89.377190][ T6003] team0: Port device team_slave_1 added [ 89.401601][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 89.406014][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 89.414104][ T6003] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 89.424734][ T6003] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 89.427024][ T6003] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 89.435701][ T6003] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 89.474093][ T6003] hsr_slave_0: entered promiscuous mode [ 89.477322][ T6003] hsr_slave_1: entered promiscuous mode [ 89.587794][ T6003] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.595248][ T6003] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.599419][ T6003] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.603708][ T6003] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.621594][ T6003] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.624124][ T6003] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.627602][ T6003] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.630531][ T6003] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.664214][ T6003] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.674521][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 89.677954][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 89.687218][ T6003] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.693407][ T1219] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.695716][ T1219] bridge0: port 1(bridge_slave_0) entered forwarding state [ 89.700745][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 89.703152][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 89.806483][ T6003] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 89.826094][ T6003] veth0_vlan: entered promiscuous mode [ 89.830900][ T6003] veth1_vlan: entered promiscuous mode [ 89.846569][ T6003] veth0_macvtap: entered promiscuous mode [ 89.850456][ T6003] veth1_macvtap: entered promiscuous mode [ 89.862136][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 89.868891][ T6003] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 89.879856][ T46] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.883597][ T46] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.887949][ T46] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.891628][ T46] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 89.971407][ T46] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.033997][ T1219] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.036927][ T1219] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.053679][ T13] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 90.056171][ T13] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 90.069992][ T46] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.173153][ T46] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 90.247130][ T46] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 2026/02/04 23:38:57 executed programs: 0 [ 91.191234][ T64] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 91.195075][ T64] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 91.198747][ T64] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 91.203680][ T64] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 91.206456][ T64] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 91.296338][ T6055] chnl_net:caif_netlink_parms(): no params data found [ 91.360280][ T6055] bridge0: port 1(bridge_slave_0) entered blocking state [ 91.363432][ T6055] bridge0: port 1(bridge_slave_0) entered disabled state [ 91.366482][ T6055] bridge_slave_0: entered allmulticast mode [ 91.370530][ T6055] bridge_slave_0: entered promiscuous mode [ 91.375016][ T6055] bridge0: port 2(bridge_slave_1) entered blocking state [ 91.377576][ T6055] bridge0: port 2(bridge_slave_1) entered disabled state [ 91.379979][ T6055] bridge_slave_1: entered allmulticast mode [ 91.382723][ T6055] bridge_slave_1: entered promiscuous mode [ 91.396834][ T6055] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 91.401116][ T6055] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.415620][ T6055] team0: Port device team_slave_0 added [ 91.418752][ T6055] team0: Port device team_slave_1 added [ 91.431343][ T6055] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 91.433852][ T6055] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 91.442715][ T6055] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 91.448622][ T6055] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 91.451167][ T6055] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 91.459549][ T6055] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 91.485000][ T6055] hsr_slave_0: entered promiscuous mode [ 91.487843][ T6055] hsr_slave_1: entered promiscuous mode [ 91.490474][ T6055] debugfs: 'hsr0' already exists in 'hsr' [ 91.493008][ T6055] Cannot create hsr debugfs directory [ 93.272916][ T5294] Bluetooth: hci0: command tx timeout [ 93.465047][ T46] bridge_slave_1: left allmulticast mode [ 93.467067][ T46] bridge_slave_1: left promiscuous mode [ 93.469371][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 93.474761][ T46] bridge_slave_0: left allmulticast mode [ 93.476580][ T46] bridge_slave_0: left promiscuous mode [ 93.478791][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 93.661149][ T46] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 93.665354][ T46] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 93.668872][ T46] bond0 (unregistering): Released all slaves [ 93.733245][ T40] kauditd_printk_skb: 20 callbacks suppressed [ 93.733257][ T40] audit: type=1400 audit(1770248340.093:112): avc: denied { create } for pid=6064 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.742274][ T40] audit: type=1400 audit(1770248340.093:113): avc: denied { write } for pid=6064 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.750419][ T40] audit: type=1400 audit(1770248340.093:114): avc: denied { append } for pid=6064 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.770350][ T40] audit: type=1400 audit(1770248340.123:115): avc: denied { unlink } for pid=6067 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=2100 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 93.827867][ T46] hsr_slave_0: left promiscuous mode [ 93.830062][ T46] hsr_slave_1: left promiscuous mode [ 93.832198][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.834538][ T46] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.837411][ T46] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 93.839777][ T46] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 93.848218][ T46] veth1_macvtap: left promiscuous mode [ 93.850128][ T46] veth0_macvtap: left promiscuous mode [ 93.851999][ T46] veth1_vlan: left promiscuous mode [ 93.855430][ T46] veth0_vlan: left promiscuous mode [ 94.060914][ T46] team0 (unregistering): Port device team_slave_1 removed [ 94.077096][ T46] team0 (unregistering): Port device team_slave_0 removed [ 94.651534][ T6055] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 94.670965][ T6055] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 94.682943][ T6055] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 94.688076][ T6055] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 94.722757][ T6055] 8021q: adding VLAN 0 to HW filter on device bond0 [ 94.731106][ T6055] 8021q: adding VLAN 0 to HW filter on device team0 [ 94.735830][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 94.738285][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 94.744271][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 94.746902][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 95.007166][ T6055] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 95.046111][ T6055] veth0_vlan: entered promiscuous mode [ 95.054658][ T6055] veth1_vlan: entered promiscuous mode [ 95.081168][ T6055] veth0_macvtap: entered promiscuous mode [ 95.088787][ T6055] veth1_macvtap: entered promiscuous mode [ 95.104248][ T6055] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 95.111375][ T6055] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 95.126124][ T1144] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.130065][ T1144] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.150708][ T1144] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.154256][ T1144] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.189520][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.192276][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.204903][ T1144] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 95.208149][ T1144] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 95.254070][ T40] audit: type=1404 audit(1770248341.613:116): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 95.269516][ T40] audit: type=1400 audit(1770248341.623:117): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.292972][ T40] audit: type=1400 audit(1770248341.653:118): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.308252][ T40] audit: type=1400 audit(1770248341.663:119): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.335019][ T40] audit: type=1400 audit(1770248341.693:120): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.350836][ T40] audit: type=1400 audit(1770248341.703:121): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 95.352192][ T5294] Bluetooth: hci0: command tx timeout [ 97.432503][ T5294] Bluetooth: hci0: command tx timeout [ 98.760691][ T40] kauditd_printk_skb: 182 callbacks suppressed [ 98.760704][ T40] audit: type=1400 audit(1770248345.113:304): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.771375][ T40] audit: type=1400 audit(1770248345.123:305): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.780763][ T40] audit: type=1400 audit(1770248345.133:306): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.810402][ T40] audit: type=1400 audit(1770248345.163:307): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.824043][ T40] audit: type=1400 audit(1770248345.183:308): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.837733][ T40] audit: type=1400 audit(1770248345.193:309): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.890523][ T40] audit: type=1400 audit(1770248345.243:310): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.901163][ T40] audit: type=1400 audit(1770248345.253:311): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.915033][ T40] audit: type=1400 audit(1770248345.273:312): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.934292][ T40] audit: type=1400 audit(1770248345.293:313): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 99.513094][ T5294] Bluetooth: hci0: command tx timeout [ 103.790979][ T40] kauditd_printk_skb: 255 callbacks suppressed [ 103.790993][ T40] audit: type=1400 audit(1770248350.143:569): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.801579][ T40] audit: type=1400 audit(1770248350.153:570): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.811049][ T40] audit: type=1400 audit(1770248350.173:571): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.850715][ T40] audit: type=1400 audit(1770248350.203:572): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.860185][ T40] audit: type=1400 audit(1770248350.213:573): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.868364][ T40] audit: type=1400 audit(1770248350.223:574): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.900109][ T40] audit: type=1400 audit(1770248350.253:575): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.909439][ T40] audit: type=1400 audit(1770248350.263:576): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.919577][ T40] audit: type=1400 audit(1770248350.273:577): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.959823][ T40] audit: type=1400 audit(1770248350.313:578): avc: denied { read write } for pid=6055 comm="syz-executor" name="loop0" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 106.809030][ T1219] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.905045][ T1219] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 106.994845][ T1219] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.075838][ T1219] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 107.178927][ T1219] bridge_slave_1: left allmulticast mode [ 107.180912][ T1219] bridge_slave_1: left promiscuous mode [ 107.183853][ T1219] bridge0: port 2(bridge_slave_1) entered disabled state [ 107.188915][ T1219] bridge_slave_0: left allmulticast mode [ 107.191389][ T1219] bridge_slave_0: left promiscuous mode [ 107.195054][ T1219] bridge0: port 1(bridge_slave_0) entered disabled state [ 107.432401][ T1219] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 107.436815][ T1219] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 107.440181][ T1219] bond0 (unregistering): Released all slaves [ 107.748477][ T1219] hsr_slave_0: left promiscuous mode [ 107.751938][ T1219] hsr_slave_1: left promiscuous mode [ 107.754622][ T1219] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 107.757126][ T1219] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 107.760729][ T1219] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 107.763403][ T1219] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 107.771079][ T1219] veth1_macvtap: left promiscuous mode [ 107.773095][ T1219] veth0_macvtap: left promiscuous mode [ 107.774912][ T1219] veth1_vlan: left promiscuous mode [ 107.776665][ T1219] veth0_vlan: left promiscuous mode [ 108.023594][ T1219] team0 (unregistering): Port device team_slave_1 removed [ 108.040633][ T1219] team0 (unregistering): Port device team_slave_0 removed [ 108.792226][ T40] kauditd_printk_skb: 11739 callbacks suppressed [ 108.792243][ T40] audit: type=1400 audit(1770248355.143:12003): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.798027][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.803616][ T40] audit: type=1400 audit(1770248355.153:12004): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.805425][ T5645] audit: audit_lost=106 audit_rate_limit=0 audit_backlog_limit=64 [ 108.814360][ T40] audit: type=1400 audit(1770248355.153:12005): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.816974][ T5645] audit: backlog limit exceeded [ 108.825054][ T40] audit: type=1400 audit(1770248355.153:12006): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.827471][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 108.834483][ T40] audit: type=1400 audit(1770248355.153:12007): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 108.836985][ T5645] audit: audit_lost=107 audit_rate_limit=0 audit_backlog_limit=64 [ 113.802237][ T40] kauditd_printk_skb: 41859 callbacks suppressed [ 113.802250][ T40] audit: type=1400 audit(1770248360.163:53866): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.811017][ T40] audit: type=1400 audit(1770248360.163:53867): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.817968][ T40] audit: type=1400 audit(1770248360.163:53868): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.825059][ T40] audit: type=1400 audit(1770248360.163:53869): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.831661][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.831737][ T40] audit: type=1400 audit(1770248360.163:53870): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 113.834297][ T5645] audit: audit_lost=108 audit_rate_limit=0 audit_backlog_limit=64 [ 113.834311][ T5645] audit: backlog limit exceeded [ 113.834541][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 113.840991][ T40] audit: type=1400 audit(1770248360.163:53871): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.812110][ T40] kauditd_printk_skb: 46108 callbacks suppressed [ 118.812126][ T40] audit: type=1400 audit(1770248365.163:99444): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.817554][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.823698][ T40] audit: type=1400 audit(1770248365.173:99445): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.825746][ T5645] audit: audit_lost=288 audit_rate_limit=0 audit_backlog_limit=64 [ 118.825756][ T5645] audit: backlog limit exceeded [ 118.834159][ T40] audit: type=1400 audit(1770248365.173:99446): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.836816][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 118.838698][ T40] audit: type=1400 audit(1770248365.173:99447): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 118.845251][ T5645] audit: audit_lost=289 audit_rate_limit=0 audit_backlog_limit=64 [ 118.845262][ T5645] audit: backlog limit exceeded [ 123.822098][ T40] kauditd_printk_skb: 39598 callbacks suppressed [ 123.822111][ T40] audit: type=1400 audit(1770248370.173:138434): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.830608][ T40] audit: type=1400 audit(1770248370.183:138435): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.835750][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 123.837353][ T40] audit: type=1400 audit(1770248370.183:138436): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.839887][ T5645] audit: audit_lost=494 audit_rate_limit=0 audit_backlog_limit=64 [ 123.846822][ T40] audit: type=1400 audit(1770248370.183:138437): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.849825][ T5645] audit: backlog limit exceeded [ 123.856790][ T40] audit: type=1400 audit(1770248370.183:138438): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0 [ 123.859357][ T5645] audit: audit_backlog=65 > audit_backlog_limit=64 [ 123.865516][ T40] audit: type=1400 audit(1770248370.183:138439): avc: denied { read } for pid=5645 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=0